63% of organizations face security breaches due to hardware vulnerabilities

Tech Republic Security

While hardware-level attacks are high, only 59% of companies have implemented a hardware security strategy, Dell and Forrester found

Dell 52

How Microsoft is using hardware to secure firmware

Tech Republic Security

Even full disk encryption can't keep you secure if your PC firmware is compromised, so Secured-core PCs will use the CPU to check if UEFI is telling the truth about secure boot

Intel to set up new group to focus on hardware security

Computer Weekly

Chip maker is reportedly planning to form a new group to focus on hardware security as it scrambles to limit the impact of recently discovered security flaws in chip designs

New Evidence of Hacked Supermicro Hardware Found in U.S. Telecom

CTOvision

telecommunications company discovered manipulated hardware from Super Micro Computer Inc. according to a security expert working for the telecom company. The security expert, Yossi Appleboum, provided documents, analysis and other evidence […]. CTO Cyber Security NewsA major U.S. in its network and removed it in August, fresh evidence of tampering in China of critical technology components bound for the U.S.,

We love ideas like this: Open-source hardware could defend against the next generation of hacking

CTOvision

Pearce argue that open-source hardware could be the ultimate key against cyber attacks that companies are trying hard to find on The Conversation : You must have heard about open-source software helping in fighting cyber attacks but imagine open-source hardware doing the same job for you in much better way. Cyber Security NewsRead Prof. Joshua M.

How Google’s Custom Security Chip Secures Servers at Boot

Data Center Knowledge

Software security tools are increasingly augmented with dedicated security processors Read More. Design Google Hardware Security

Google 147

The Endpoint Imperative: In a Software World, Hardware Does Matter

Cloud Musings

Hardware matters. From productivity to security to innovation, make sure your machines can keep up. Intel’s Sarah Wieskus joins The End Point Imperative: A Podcast series from Intel to discuss the importance of stable, optimized hardware in today’s digital world.

NSA’s Hardware Tampering May Alter Global Product Flow

Data Center Knowledge

when supplying hardware to customers overseas Read More. Cisco Dell Networking Regulation Security vendors may be looking at circumventing U.S.

HPE’s Gen10 Servers Will Have Security Drilled into Silicon

Data Center Knowledge

The company's custom silicon enables security at the firmware level. Design Hardware Hewlett Packard Enterprise SecurityRead More.

Supermicro is the latest hardware vendor with a security issue

Network World

Security researchers with Eclypsium, a firm created by two former Intel executives that specializes in rooting out vulnerabilities in server firmware, have uncovered vulnerabilities affecting the firmware of Supermicro servers. A physical attacker who can open the case could simply attach a hardware programmer to bypass protections.

Microsoft makes Windows 10 hardware change for PC security

Network World

Microsoft is rolling out a change in minimum hardware requirements for Windows 10 PCs and mobile devices, and expects hardware makers to comply in order to make their devices more secure. Starting Thursday, PC makers should include a hardware-based security feature called TPM (Trusted Platform Module) 2.0 security layer -- which can be in the form of a chip or firmware -- can safeguard user data by managing and storing cryptographic keys in a trusted container.

Gartner Top 7 Security and Risk Trends for 2019

CEB IT

Creating simple, practical and pragmatic risk appetite statements enabled this CISO to break down the cultural disconnect that existed between the security team and the different business units. This is one of seven security and risk management trends that Gartner expects to impact CISOs in 2019. 2: There is renewed interest in implementing or maturing security operations centers (SOCs) with a focus on threat detection and response. Security

Trends 159

Intel divests McAfee after rough marriage, will now secure hardware

Network World

McAfee will now again become a standalone security company, but Intel will retain a minority 49 percent stake. The chip maker will focus internal operations on hardware-level security. Intel's finally washing its hands of McAfee after seven up and down years, which included a lawsuit last year from John McAfee, after whom the company is named. The chip maker has divested its majority holdings in McAfee to investment firm TPG for US$3.1 billion.

Amazon unveils new data center hardware to get you securely into the cloud

Tech Republic Data Center

At the 2016 re:Invent conference, AWS CEO Andy Jassy unveiled two new products, the Snowball Edge and Snowmobile, to make it even easier to get your data into the cloud

Cisco Beefs Up Network Automation, Shifting Further Away from Hardware Focus

Data Center Knowledge

Slew of new software-defined products and services aimed at networks and security Read More. Cisco Networking Security

Hardware In An Era Of Software-Defined Everything - Chuck's Blog

Chuck's Blog - EMC

Hardware In An Era Of Software-Defined Everything.   While that's quite true, there's a much smaller group who sees something far more impactful -- a complete re-thinking of cloud-scale IT infrastructures: both software and hardware. security. Chucks Blog.

Why You Don’t Need a Hardware Refresh

ITGCT

Businesses are in a position where they need to be able to leverage the “latest and greatest” in terms of hardware and software to maintain a competitive advantage, but are also balking at the upfront investment normally required at the same time.

Self-checking chips could eliminate hardware security issues

Tech Republic Security

Researchers may have found a way to validate chips, so all concerned parties are satisfied the silicon is backdoor-free

12 hardware and software vulnerabilities you should address now

Network World

It's not a stretch to say that most organizations have at least some old hardware and software still in use. Walker White, president of BDNA, a company that tracks and analyzes end-of-life (EOL) data for hardware, software and medical devices, says that the main problem with out-of-date software and legacy hardware is that once they pass their EOL cycle, the vendor no longer maintains or supports the products, resulting in security vulnerabilities and risk to organizations.

Attackers can use CPU hardware bug for data

IT Manager Daily

Threat: Two vulnerabilities have been found in CPU hardware that utilizes speculative execution. The post Attackers can use CPU hardware bug for data appeared first on IT Manager Daily. In this week's e-newsletter IT Security CPU vulnerabilitiesMultiple vulnerabilities found in CPUs could put you at risk. Damage risk: The vulnerabilities, named Variant 3a and Variant 4, would allow bad actors with local user access to control future speculative execution.

Is your enterprise software committing security malpractice?

Network World

Well, apparently that’s nothing compared to what enterprise security, analytics, and hardware management tools are doing. ExtraHop deliberately chose not to name names in its four examples of enterprise security tools that were sending out data without warning the customer or user.

Wireless Security | Roadmap to Securing Your Infrastructure

Linux Academy

Wireless security is not only a huge subject, but it’s also extremely important. It was patched quickly but this raised wireless security questions about WPA2. This is a great example of being proactive in security. Six Tips for Upgrading Your Wireless Security.

How to Keep Company IoT Networks Secure

CTOvision

Read Grayson Kemper explain how companies can keep the Internet of Things networks secure on IoT for All : As employees increase how often they use smart devices as part of their daily jobs, businesses are investing in building IoT networks. While IoT networks make information accessible and protected from hardware errors, businesses should invest in […].

Boeing Black Smartphone: Security, modularity and productivity

CTOvision

Security, modularity and productivity delivered – all in one trusted mobile device. defense and security communities demand trusted access to data to accomplish their missions. Hardware Root of Trust : Ensures software authenticity. Secure Boot : Maintains device image integrity.

Solarflare: Revolutionizing the way enterprises scale, manage and secure data centers

CTOvision

Solarflare is a leading provider of application-intelligent networking I/O software and hardware that facilitate the acceleration, monitoring and security of network data. CTO Cyber Security Infrastructure Companies News Security Companies SolarflareResearch Team.

A Flicker Of Light: A new security stack points the path to safety

CTOvision

Defense-in-depth, the gold standard in cyber security, has failed. The basis behind defense-in-depth is to deploy redundant layers of security products to defeat every part the cyber kill chain. Conceptually the new security stack is a hardware-based virtual enclave.

One Click and Voilà, Your Entire Data Center is Encrypted

Data Center Knowledge

Design Featured Hardware IBM SecurityIBM says its new encryption engine will allow users to encrypt all data in their databases, applications, and cloud services with no performance hit. Read More.

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure. This is not good security practice. Standardizing secure configurations. Can you believe it’s already May?

Where Business is Getting IoT Security Wrong

IT Toolbox

Securing IoT is tricky business. IoT exploits include firmware spoofing, compromising hardware, man-in-the-middle attacks, interface exploits, and cloud hosted application hacks, among others. Businesses are not always ready for the unique security challenge posed by the massive deployment of IoT devices. “Current IT security control frameworks

Big Data Cyber Security Architect Eddie Garcia Discusses Best Practices at 27 Jan Breakfast in DC

CTOvision

Eddie Garcia is regarded as one of the nation''s greatest Big Data security architects. At Gazzang he led engineering teams through successful fielding of secure hadoop deployments where security was provided without sacrificing performance. By Bob Gourley.

Android gets patches for critical flaws in media handling, hardware drivers

Network World

Android is getting security fixes for more than 100 vulnerabilities, including 29 critical flaws in the media processing server, hardware-specific drivers and other components. Android's monthly security bulletin, published Monday , was split into two "patch levels," which are represented as date strings on the "About" page of Android devices.

Join World Renowned Big Data Cyber Security Architect Eddie Garcia at 27 Jan Breakfast

CTOvision

Eddie Garcia is regarded as one of the nation''s greatest Big Data security architects. At Gazzang he led engineering teams through successful fielding of secure hadoop deployments where security was provided without sacrificing performance. By Bob Gourley.

Android gets patches for serious flaws in hardware drivers and media server

Network World

The June batch of Android security patches addresses nearly two dozen vulnerabilities in system drivers for various hardware components from several chipset makers. The largest number of critical and high severity flaws were patched in the Qualcomm video driver, sound driver, GPU driver, Wi-Fi driver, and camera driver.

Naturally Better Security: Leveraging the power of nature to enhance Internet security

CTOvision

Nature is now providing engineers with the missing link that can help with the most vexing challenge of our age: enabling both security and functionality in our interconnected IT systems. Adversaries, including cyber criminals, states seeking national security information, hackers seeking glory, and hacktivists pushing causes, have all come to realize the value of successful cyberattacks, and they show no sign of stopping. CTO Cyber Security NewsBob Gourley.

10 New Information Security Roles for the Digitization Era

CEB IT

High demand and a limited pool of people with the right skills and experience make information security staffing a perennial challenge. Further complicating things is the fact that information security teams have not yet adapted to their changing role in digitizing companies.